O Level Exam : Student Portal
Email address
Password
Remember me
Forgot password?
Sign In
Google
Facebook
Don't have an account?
Register now
O Level Online Exam
Menu mobile
Home
MCQ Topic Wise
INFORMATION TECHNOLOGY TOOLS AND NETWORK BASICS
New
WEB DESIGNING AND PUBLISHING
New
PROGRAMMING AND PROBLEM SOLVING THROUGH PYTHON
New
INTERNET OF THINGS AND ITS APPLICATIONS
New
Online Mock Test
INFORMATION TECHNOLOGY TOOLS AND NETWORK BASICS
New
WEB DESIGNING AND PUBLISHING
New
PROGRAMMING AND PROBLEM SOLVING THROUGH PYTHON
New
INTERNET OF THINGS AND ITS APPLICATIONS
New
Old Papers
Practical Questions
Videos
Projects
True/False Questions : OVERVIEW OF FUTURE SKILLS AND CYBER SECURITY For NIELIT O Level Exam
OVERVIEW OF FUTURE SKILLS AND CYBER SECURITY For NIELIT O Level Exam
00:00:00
English
Hindi
Question No# :
01
out of 20
Report Bug
Bookmark
Buying legal software from reputed retailers or organizations is a way to stop Software Piracy.
A.
TRUE
B.
FALSE
Question No# :
02
out of 20
Report Bug
Bookmark
The Full Name Of Cms Is Content Management System?
CMS का पूरा नाम Content Management System होता है?
A.
TRUE
B.
FALSE
Question No# :
03
out of 20
Report Bug
Bookmark
Spware monitors user activity on internet and transmit that information in the background to someone else
Spware monitors user activity on internet and transmit that information in the background to someone else
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
04
out of 20
Report Bug
Bookmark
A firewall is a security device deployed at the boundary of corporate intranet to protect it from unauthorized access
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
05
out of 20
Report Bug
Bookmark
Copyright refers to the freedom from intrusion by the public, especially as a right.
A.
TRUE
B.
FALSE
Question No# :
06
out of 20
Report Bug
Bookmark
Quarantine is used when certain virus may be too difficult to be removed completely, this virus are disabled and kept in a safe place so that it cannot infect other files.
A.
TRUE
B.
FALSE
Question No# :
07
out of 20
Report Bug
Bookmark
A Gigabyte contains 1000 Megabytes.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
08
out of 20
Report Bug
Bookmark
Creating and distributing viruses and/or malicious code on other computers or posting confidential business information on the Internet are also part of cybercrime.
A.
TRUE
B.
FALSE
Question No# :
09
out of 20
Report Bug
Bookmark
Attacks on confidentiality is not a type of cyber attacks
गोपनीयता पर हमला एक प्रकार का साइबर हमला नहीं है
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
10
out of 20
Report Bug
Bookmark
Digital signatures develop two types of key one Private key and second Public key that are mathematically linked
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
11
out of 20
Report Bug
Bookmark
Firewall is type of threat
फ़ायरवॉल खतरे का प्रकार है
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
12
out of 20
Report Bug
Bookmark
The internet of things allows to interact and exchange data with devices.
The internet of things allows to interact and exchange data with devices.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
13
out of 20
Report Bug
Bookmark
Phone security is the practice of defending mobile devices against a wide range of cyber attack.
Phone security is the practice of defending mobile devices against a wide range of cyber attack.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
14
out of 20
Report Bug
Bookmark
Cipher text is the meaningful form of encrypted message that can be read in transit by anyone.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
15
out of 20
Report Bug
Bookmark
Mixed Reality Experience Combines Elements From Virtual Reality And Augmented Reality?
मिश्रित वास्तविकता, अनुभव आभासी वास्तविकता और संवर्धित वास्तविकता से तत्वों को जोडती है?
A.
TRUE
B.
FALSE
Question No# :
16
out of 20
Report Bug
Bookmark
In the internet of things, information system can not be access remotely
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
17
out of 20
Report Bug
Bookmark
Mobile Device Management Feature Not Available In Windows 10?
विंडोज 10 में मोबाइल डिवाइस प्रबंधन सुविधा उपलब्ध नहीं है?
A.
TRUE
B.
FALSE
Question No# :
18
out of 20
Report Bug
Bookmark
Copyrights are automatically associated with all written documents that contain original material.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
19
out of 20
Report Bug
Bookmark
Cyber security protects the data and integrity of computing assets belonging to or connecting to an organization’s network.
Cyber security protects the data and integrity of computing assets belonging to or connecting to an organization’s network.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
20
out of 20
Report Bug
Bookmark
Right to Privacy are given to authors of literary and artistic works such as books and other writings, musical compositions, paintings, sculpture, computer programs and films.
A.
TRUE
B.
FALSE
Latest Current Affairs 2026
Online Exam Quiz for One day Exam
Online Typing Test
CCC Online Test
Python Programming Tutorials
Best Computer Training Institute in Prayagraj (Allahabad)
Online MBA 2 years
Online MCA
Online BCA
Best Website and Software Company in Allahabad